Ticket #10279: bash-14580-debug-17-12-2013-22-11-29.report

File bash-14580-debug-17-12-2013-22-11-29.report, 6.2 KB (added by kallisti5, 10 years ago)
Line 
1Debug information for team /boot/system/bin/bash (14580):
2CPU(s): 8x AMD FX-Series
3Memory: 15.95 GiB total, 463.70 MiB used
4Haiku revision: hrev46551-dirty [master] Dec 17 (BePC)
5
6Active Threads:
7 thread 14588: team 14580 debug task
8 thread 14580: sh (main)
9 state: Exception (Segment violation)
10
11 Frame IP Function Name
12 -----------------------------------------------
13 00000000 0xfc0a34 dispose_words + 0
14 Disassembly:
15 dispose_words:
16 0x00fc0a34: 55 push %ebp <--
17
18 Frame memory:
19
20 0x72143390 0xfc5c87 execute_simple_command + 0x91f
21 0x721433f0 0xfc15bd execute_command_internal + 0x62d
22 0x72143440 0x101e2c6 parse_and_execute + 0x33e
23 0x72143470 0x1021961 eval_builtin + 0x59
24 0x721434b0 0xfc5e7e execute_builtin + 0x176
25 0x721434e0 0xfc68a4 execute_builtin_or_function + 0xcc
26 0x72143540 0xfc5ad1 execute_simple_command + 0x769
27 0x721435a0 0xfc15bd execute_command_internal + 0x62d
28 0x721435f0 0xfc0dad execute_command + 0x5d
29 0x72143630 0xfc328a execute_connection + 0x1a2
30 0x72143690 0xfc1873 execute_command_internal + 0x8e3
31 0x721436e0 0xfc0dad execute_command + 0x5d
32 0x72143720 0xfc328a execute_connection + 0x1a2
33 0x72143780 0xfc1873 execute_command_internal + 0x8e3
34 0x721437d0 0xfc0dad execute_command + 0x5d
35 0x72143810 0xfc328a execute_connection + 0x1a2
36 0x72143870 0xfc1873 execute_command_internal + 0x8e3
37 0x721438c0 0xfc0dad execute_command + 0x5d
38 0x721438f0 0xfc4ac4 execute_if_command + 0xd8
39 0x72143940 0xfc17e7 execute_command_internal + 0x857
40 0x72143990 0xfc32da execute_connection + 0x1f2
41 0x721439f0 0xfc1873 execute_command_internal + 0x8e3
42 0x72143a50 0xfc1854 execute_command_internal + 0x8c4
43 0x72143ab0 0xfc6463 execute_function + 0x55b
44 0x72143af0 0xfc68c8 execute_builtin_or_function + 0xf0
45 0x72143b50 0xfc5ad1 execute_simple_command + 0x769
46 0x72143bb0 0xfc15bd execute_command_internal + 0x62d
47 0x72143c00 0xfc32da execute_connection + 0x1f2
48 0x72143c60 0xfc1873 execute_command_internal + 0x8e3
49 0x72143cb0 0xfc0dad execute_command + 0x5d
50 0x72143cf0 0xfc328a execute_connection + 0x1a2
51 0x72143d50 0xfc1873 execute_command_internal + 0x8e3
52 0x72143da0 0xfc0dad execute_command + 0x5d
53 0x72143de0 0xfc328a execute_connection + 0x1a2
54 0x72143e40 0xfc1873 execute_command_internal + 0x8e3
55 0x72143e90 0xfc0dad execute_command + 0x5d
56 0x72143ed0 0xfc328a execute_connection + 0x1a2
57 0x72143f30 0xfc1873 execute_command_internal + 0x8e3
58 0x72143f80 0xfc0dad execute_command + 0x5d
59 0x72143fb0 0xfc4ac4 execute_if_command + 0xd8
60 0x72144000 0xfc17e7 execute_command_internal + 0x857
61 0x72144050 0xfc32da execute_connection + 0x1f2
62 0x721440b0 0xfc1873 execute_command_internal + 0x8e3
63 0x72144100 0xfc0dad execute_command + 0x5d
64 0x72144140 0xfc328a execute_connection + 0x1a2
65 0x721441a0 0xfc1873 execute_command_internal + 0x8e3
66 0x721441f0 0xfc0dad execute_command + 0x5d
67 0x72144230 0xfc328a execute_connection + 0x1a2
68 0x72144290 0xfc1873 execute_command_internal + 0x8e3
69 0x721442e0 0xfc0dad execute_command + 0x5d
70 0x72144320 0xfc328a execute_connection + 0x1a2
71 0x72144380 0xfc1873 execute_command_internal + 0x8e3
72 0x721443e0 0xfc1854 execute_command_internal + 0x8c4
73 0x72144440 0xfc6463 execute_function + 0x55b
74 0x72144480 0xfc68c8 execute_builtin_or_function + 0xf0
75 0x721444e0 0xfc5ad1 execute_simple_command + 0x769
76 0x72144540 0xfc15bd execute_command_internal + 0x62d
77 0x72144590 0xfc0dad execute_command + 0x5d
78 0x721445d0 0xfc34b5 execute_connection + 0x3cd
79 0x72144630 0xfc1873 execute_command_internal + 0x8e3
80 0x72144690 0xfc1854 execute_command_internal + 0x8c4
81 0x721446e0 0xfc0dad execute_command + 0x5d
82 0x72144720 0xfc34b5 execute_connection + 0x3cd
83 0x72144780 0xfc1873 execute_command_internal + 0x8e3
84 0x721447d0 0xfc0dad execute_command + 0x5d
85 0x72144800 0xfbba83 reader_loop + 0x1eb
86 0x72144860 0xfb9a85 main + 0x8dd
87 0x72144890 0xfaef76 _start + 0x56
88 0x721448c0 0x384d68 runtime_loader + 0x130
89 00000000 0x61210250 commpage_thread_exit + 0
90
91 Registers:
92 eip: 0x00fc0a34
93 esp: 0x72143344
94 ebp: 0x72143390
95 eax: 0x00000000
96 ebx: 0x0105e038
97 ecx: 0x19115f90
98 edx: 0x00000000
99 esi: 0xffffffff
100 edi: 0x190b795e
101 cs: 0x001b
102 ds: 0x0023
103 es: 0x0023
104 fs: 0x00f3
105 gs: 0x0023
106 ss: 0x0023
107
108Loaded Images:
109 ID Text Base Text End Data Base Data End Type Name
110 --------------------------------------------------------------------------------
111 205074 0x00375000 0x00392000 0x00392000 0x00395000 lib /boot/system/runtime_loader
112 205075 0x00f8b000 0x0105d000 0x0105d000 0x0106f000 app /boot/system/bin/bash
113 205076 0x01b9a000 0x01c65000 0x01c65000 0x01caf000 lib /boot/system/lib/libroot.so
114 205073 0x61210000 0x61218000 0x00000000 0x00000000 system commpage
115
116Areas:
117 ID Base End Size (KiB) Protection Locking Name
118 --------------------------------------------------------------------------------
119 647433 0x00130000 0x00131000 4 rw-S full _rld_debug_
120 647432 0x00144000 0x00154000 64 rw- full rld heap
121 647429 0x00375000 0x00392000 116 r-x full runtime_loader_seg0ro
122 647430 0x00392000 0x00394000 8 rw- full runtime_loader_seg1rw
123 647431 0x00394000 0x00395000 4 rw- full runtime_loader_bss1
124 647434 0x00f8b000 0x0105d000 840 r-x full bash_seg0ro
125 647435 0x0105d000 0x0106c000 60 rw- full bash_seg1rw
126 647436 0x0106c000 0x0106f000 12 rw- full bash_seg2rw
127 647437 0x01b9a000 0x01c65000 812 r-x full libroot.so_seg0ro
128 647438 0x01c65000 0x01c77000 72 rw- full libroot.so_seg1rw
129 647439 0x01c77000 0x01caf000 224 rw- full libroot.so_seg2rw
130 647440 0x1909d000 0x1913d000 640 rw- full heap
131 647428 0x61210000 0x61218000 32 r-xSk full commpage
132 647426 0x61929000 0x6192d000 16 rw- full user area
133 647427 0x71141000 0x72146000 16404 rw-s full sh_14580_stack
134
135Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
136
137Semaphores:
138 ID Count Last Holder Name
139 ------------------------------------------------------------